""ET TROJAN Possible Upatre or Dyre SSL Cert Jan 22 2015""

SID: 2020290

Revision: 3

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2015_01_23, deployment Perimeter, malware_family Upatre, signature_severity Critical, tag SSL_Malicious_Cert, tag Exploit_Kit, tag Downloader, tag Upatre, updated_at 2019_08_15

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: [443,4443]

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "|16|"

  • Value: "|0b|"

  • Value: "|02 09 00|"

  • Value: "|06 03 55 04 06 13 02 43 4e|"

  • Value: "|06 03 55 04 08 0c 02|ST"

  • Value: "|55 04 07|"

Within: 3

PCRE: "/^.{2}(?P[a-zA-Z0-9]{24}[01]).+?\x55\x04\x07.{2}(?P=var)/Rs"

Special Options:

source